
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,191,223 |
PDF Download | 5,622,137 |
Legal rules and regulations in cyberspace and legal claims of the Islamic Republic of Iran | ||
سیاست دفاعی | ||
Article 5, Volume 32, Issue 122 - Serial Number 4, July 2023, Pages 119-136 PDF (532.65 K) | ||
Document Type: Original Article | ||
Authors | ||
Afshin Jafari* 1; Ali Gholamali2; Hedayatollah Derakhshan3 | ||
1Associate Professor, Payame Noor University | ||
2Asisstant Professor, Department ofislamic,faculty of Theology, Payamnoor university Tehran,iran | ||
3Graduated in M.A Public International Law | ||
Receive Date: 20 November 2021, Revise Date: 17 January 2022, Accept Date: 02 July 2023 | ||
Abstract | ||
The living environment has always faced many threats, and today another form of these threats is observed. What governments and political systems have used in the recent and distant past has been the use of force or war against a country with which they have engaged in war or conflict. But today the form of threats has changed and cyberspace is being used as a vehicle to threaten others and achieve national interests. Threatening the use of cyberspace is subject to domestic and international laws and regulations. The present study also examines the legal laws in cyberspace and the legal claims of the Islamic Republic of Iran. The question is, what are the legal provisions for dealing with threats and attacks in cyberspace from Iran? The answer is that although there are several domestic legal approaches to investigating cyber threats, they are not very effective due to their limited internal space. But in order to apply the teachings of international law, to invoke threats to peace and security, such as the so-called Security Council and the Charter of the United Nations; Recourse to regional and international declarations and charters, recourse to the International Court of Justice to identify and punish aggressors, and finally invoking the principle of legitimate defense are recognized in various sections of cyber law. In the present study, a descriptive-analytical method was used. | ||
Keywords | ||
Laws; Cyberspace; Lawsuits; Islamic Republic of Iran | ||
References | ||
باقری، رضا (1397)، پدیدههای ناامنی نرمافزاری و امنیت هستیشناختی در جمهوری اسلامی ایران(تأثیر فضای سایبر بر هویت فردی و ملی)، پایاننامه دکتری، گروه علوم سیاسی، دانشگاه شهید باهنر.
جلالی، محمود، توسلی اردکانی، سعیده (1398)، ضرورت ایجاد نظام هماهنگ حقوقی بینالمللی در مقابله با جرایم در فضای مجازی، فصلنامه مطالعات حقوق عمومی، دوره 49، شماره 4، صص 1372-1351.
جی پست، دیوید (1385)، هرج ومرج، دولت واینترنت، جستاری در باب قانونگذاری در فضای شبکه ای، ترجمه پرویزعلوی، فصلنامه علمی ـ پژوهشی دانشگاه آزاد اسلامی واحد آشتیان، پیش شماره ۱، پاییز ۱۳۸۵.
زمانی، سید قاسم (1377)، جایگاه قاعده آمره در میان منابع حقوق بینالملل، مجله حقوقی شماره 22، صص 334-305.
سلیمانیپورلک، فاطمه (1392)، قدرت نرم در استراتژی خاورمیانهای آمریکا، چاپ سوم، تهران، انتشارات پژوهشکده مطالعات راهبردی.
ضیایی، سیدیاسر؛ شکیبنژاد، احسان (1396)، "قانونگذاری در فضای سایبر"، مجله حقوقی بینالمللی، دوره 34، شماره57.
عظیمی، فاطمه، خشنودی، هادی (1395)، "نقش تروریسم سایبری در تهدید علیه امنیت ایران و راههای پیشگیری از آن"، فصلنامه مطالعات سیاسی، سال نهم، شماره 34، صص 172-159.
قاسمی، علی، چهاربخش، ویکتوربارین (1391)، "حملات سایبری و حقوق بینالملل"، مجله حقوقی دادگستری، شماره 78، صص 146-115.
قنبری جهرمی، محمدحسین (1399)، "فلسفه جنگهای نیابتی در عصر جدید"، مجله سیاست دفاعی، (113)29.
Akeherst, Micheal (1984), A Modern Introduction to International Law, op.cit.pp.259 - 262
Albakri, M., Sturm, L., Williams, C. B., & Tarazaga, P. (2017). Impedance-based non-destructive evaluation of additively manufactured parts. Rapid Prototyping Journal, 23(3), 589–601. https://doi.org/10.1108/RPJ-03-2016-0046.
Anthony Aust, Handbook of International Law, Cambridge University Press, New York, 2010, p. 40.
Chander, Anupam & Madhavi Sunder, “The Romance of the Public Domain”, California Law Review, vol. 92, 2004.
Chesterman,S. T.M.Franck and D.M.Mallone,(2008) Law and Practice of the United Nations, Oxford.
Elhabashy, Ahmad E., Lee J. Wells, Jaime A. Camelio & William H. Woodall (2014), A cyber-physical attack taxonomy for production systems: a quality control perspective, Journal of Intelligent Manufacturing volume 30, pages2489–2504.
Everard, Jerry (2000) Virtual StatesThe Internet and the boundaries of the nation-state, Rutledge publication. Garner, B.A. (2009), Black’s Law Dictionary, Eagan: West Group, 9th ed.
Gellman, Barton(2002), Cyber Attacks by Al Qaeda Feared; Terrorists at Threshold of Using Internet as Tool of Bloodshed, Experts Say, WASH. POST, June 27, 2002, at A01.
Hathaway, Oona and Crootof, Rebecca(2012), Levitz Philip, “The Law of Cyber Attack”, California Law Review.
Ignarski, Jonathan , Barrister Alfred M. de Zayas (1982), Encyclopedia of Public International Law, Use of force, War and Neutrality Peae Treaties (vol 3), Amsterdam: Published under the Auspices of the Max Planck institute, North Holand Publishing company.
Jiaxuan Fei ; Congcong Shi ; Xuechong Yuan ; Rui Zhang (2019), Wei Chen Reserch on Cyber Attack of key Measurement and Control Equipment in Power Grid, IEEE Digital Library, https://ieeexplore.ieee.org/abstract/document/87913016.
Lewis, James Andrew(2020), “Cyber Stability, Conflict Prevention, and Capacity Building”, Center for Strategic and International Studies in Washington, D.C.
Michele L., Frank, Jonathan H. Grenier, and Jonathan S. Pyzoha (2019), How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal of Information Systems: Vol. 33, No. 3, pp. 183-200.
Weisbord, N.(2009), “Conceptualizing Aggression”, Duke J.Comp. & Int’l L., No. 20. | ||
Statistics Article View: 290 PDF Download: 371 |